Reference Hub1
IoT Forensic Science: Principles, Processes, and Activities

IoT Forensic Science: Principles, Processes, and Activities

Eoghan Casey, Hannes Spichiger, Elénore Ryser, Francesco Servida, David-Olivier Jaquet-Chiffelle
ISBN13: 9781799824442|ISBN10: 1799824446|ISBN13 Softcover: 9781799824459|EISBN13: 9781799824466
DOI: 10.4018/978-1-7998-2444-2.ch001
Cite Chapter Cite Chapter

MLA

Casey, Eoghan, et al. "IoT Forensic Science: Principles, Processes, and Activities." Applied Approach to Privacy and Security for the Internet of Things, edited by Parag Chatterjee, et al., IGI Global, 2020, pp. 1-37. https://doi.org/10.4018/978-1-7998-2444-2.ch001

APA

Casey, E., Spichiger, H., Ryser, E., Servida, F., & Jaquet-Chiffelle, D. (2020). IoT Forensic Science: Principles, Processes, and Activities. In P. Chatterjee, E. Benoist, & A. Nath (Eds.), Applied Approach to Privacy and Security for the Internet of Things (pp. 1-37). IGI Global. https://doi.org/10.4018/978-1-7998-2444-2.ch001

Chicago

Casey, Eoghan, et al. "IoT Forensic Science: Principles, Processes, and Activities." In Applied Approach to Privacy and Security for the Internet of Things, edited by Parag Chatterjee, Emmanuel Benoist, and Asoke Nath, 1-37. Hershey, PA: IGI Global, 2020. https://doi.org/10.4018/978-1-7998-2444-2.ch001

Export Reference

Mendeley
Favorite

Abstract

IoT devices produce information that can be used in criminal investigations and cybersecurity incidents to make inferences about identities, locations, chronologies, and relationships between relevant entities. Before this information is relied upon to make critical decisions, its veracity must be assessed critically, and the link between virtual and physical worlds must be evaluated carefully. This chapter presents the forensic science principles needed to exploit the full potential of IoT traces, including uniqueness, exchange, provenance, integrity, reliability, repeatability, evaluating links between virtual and physical entities, and formally assessing alternative hypotheses. This chapter also discusses core forensic processes and activities, demonstrating their application to forensic analysis of IoT devices using practical examples. A typology of IoT traces is proposed and their usefulness during an investigation is discussed. Finally, an investigative scenario is presented to illustrate the opportunities and challenges of exploiting IoT devices and traces for investigative and forensic purposes.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.